System and method for key material protection on devices using a secret sharing scheme

作者: Kevin D. Bowers , Nikolaos Triandopoulos , Todd A. Morneau , Salah Machani

DOI:

关键词: EncryptionKey distributionComputer scienceVerifiable secret sharingKey (cryptography)Secret sharingHomomorphic secret sharingComputer securityShared secretSecure multi-party computation

摘要: Encryption key(s) and/or other protected material are on devices. A secret splitting scheme is applied to a secret, S, that protects at least one data item obtain plurality of shares. At share encrypted provide using an encryption uses as the key. subset shares and share(s) required reconstruct S. One or more provided device, for example, based corresponding key-release policy, allow access item(s) secured by The comprises, key used protect content container vault storing items.

参考文章(18)
Wesley Leggette, Jason K. Resch, Generating an encrypted message for storage ,(2012)
Masakatsu Matsuo, Secret sharing method and system ,(2013)
Jan L. Camenisch, Michael P. Waidner, Matthias Schunter, Endre-Feliz F. Bangerter, Privacy-protecting integrity attestation of a computing platform ,(2008)
Roy Peter D'Souza, Securing a secret of a user ,(2015)
Eliphaz Hibshoosh, Aviad Kipnis, Key generation using multiple sets of secret shares ,(2012)
Greg Dhuse, Wesley Leggette, Jason K. Resch, Generating a secure signature utilizing a plurality of key shares ,(2012)
Jason L. Peipelman, Matthew J. Ward, Joshua Marshall Rhoades, A. Jennas Ii Paul, Iterative data secret-sharing transformation ,(2010)